420 research outputs found
Getting pwn'd by AI: Penetration Testing with Large Language Models
The field of software security testing, more specifically penetration
testing, is an activity that requires high levels of expertise and involves
many manual testing and analysis steps. This paper explores the potential usage
of large-language models, such as GPT3.5, to augment penetration testers with
AI sparring partners. We explore the feasibility of supplementing penetration
testers with AI models for two distinct use cases: high-level task planning for
security testing assignments and low-level vulnerability hunting within a
vulnerable virtual machine. For the latter, we implemented a closed-feedback
loop between LLM-generated low-level actions with a vulnerable virtual machine
(connected through SSH) and allowed the LLM to analyze the machine state for
vulnerabilities and suggest concrete attack vectors which were automatically
executed within the virtual machine. We discuss promising initial results,
detail avenues for improvement, and close deliberating on the ethics of
providing AI-based sparring partners
Queueing systems with different types of renovation mechanism and thresholds as the mathematical models of active queue management mechanism
This article is devoted to some aspects of using the renovation mechanism (different types of renovation are considered, definitions and brief overview are also given) with one or several thresholds as the mathematical models of active queue management mechanisms. The attention is paid to the queuing systems in which a threshold mechanism with renovation is implemented. This mechanism allows to adjust the number of packets in the system by dropping (resetting) them from the queue depending on the ratio of a certain control parameter with specified thresholds at the moment of the end of service on the device (server) (in contrast to standard RED-like algorithms, when a possible drop of a packet occurs at the time of arrivals of next packets in the system). The models with one, two and three thresholds with different types of renovation are under consideration. It is worth noting that the thresholds determine not only from which place in the buffer the packets are dropped, but also to which the reset of packets occurs. For some of the models certain analytical and numerical results are obtained (the references are given), some of them are only under investigation, so only the mathematical model and current results may be considered. Some results of comparing classic RED algorithm with renovation mechanism are presented.Π Π°Π±ΠΎΡΠ° ΠΏΠΎΡΠ²ΡΡΠ΅Π½Π° Π½Π΅ΠΊΠΎΡΠΎΡΡΠΌ Π°ΡΠΏΠ΅ΠΊΡΠ°ΠΌ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ ΠΌΠ΅Ρ
Π°Π½ΠΈΠ·ΠΌΠ° ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΡ (ΡΠ°Π·Π»ΠΈΡΠ½ΡΠ΅ Π²Π°ΡΠΈΠ°Π½ΡΡ ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΡ ΡΠ°ΡΡΠΌΠΎΡΡΠ΅Π½Ρ, ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½ΠΈΡ ΠΈ ΠΊΡΠ°ΡΠΊΠΈΠΉ ΠΎΠ±Π·ΠΎΡ ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Ρ) Ρ ΠΎΠ΄Π½ΠΈΠΌ ΠΈΠ»ΠΈ Π½Π΅ΡΠΊΠΎΠ»ΡΠΊΠΈΠΌΠΈ ΠΏΠΎΡΠΎΠ³Π°ΠΌΠΈ Π² ΠΊΠ°ΡΠ΅ΡΡΠ²Π΅ ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΠΌΠ΅Ρ
Π°Π½ΠΈΠ·ΠΌΠΎΠ² Π°ΠΊΡΠΈΠ²Π½ΠΎΠ³ΠΎ ΡΠΏΡΠ°Π²Π»Π΅Π½ΠΈΡ ΠΎΡΠ΅ΡΠ΅Π΄ΡΠΌΠΈ. ΠΠΏΠΈΡΠ°Π½Ρ ΡΠΈΡΡΠ΅ΠΌΡ ΠΌΠ°ΡΡΠΎΠ²ΠΎΠ³ΠΎ ΠΎΠ±ΡΠ»ΡΠΆΠΈΠ²Π°Π½ΠΈΡ, Π² ΠΊΠΎΡΠΎΡΡΡ
ΡΠ΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Π½ ΠΌΠ΅Ρ
Π°Π½ΠΈΠ·ΠΌ ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΡ Ρ ΠΏΠΎΡΠΎΠ³Π°ΠΌΠΈ, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠΉ ΡΠΏΡΠ°Π²Π»ΡΡΡ ΡΠΈΡΠ»ΠΎΠΌ Π·Π°ΡΠ²ΠΎΠΊ Π² ΡΠΈΡΡΠ΅ΠΌΠ΅ ΠΏΡΡΠ΅ΠΌ ΠΈΡ
ΡΠ±ΡΠΎΡΠ° ΠΈΠ· Π½Π°ΠΊΠΎΠΏΠΈΡΠ΅Π»Ρ Π² Π·Π°Π²ΠΈΡΠΈΠΌΠΎΡΡΠΈ ΠΎΡ Π·Π½Π°ΡΠ΅Π½ΠΈΡ Π½Π΅ΠΊΠΎΡΠΎΡΠΎΠ³ΠΎ ΡΠΏΡΠ°Π²Π»ΡΡΡΠ΅Π³ΠΎ ΠΏΠ°ΡΠ°ΠΌΠ΅ΡΡΠ° ΠΈ ΠΏΠΎΡΠΎΠ³ΠΎΠ²ΡΡ
Π·Π½Π°ΡΠ΅Π½ΠΈΠΉ. Π‘Π±ΡΠΎΡ Π·Π°ΡΠ²ΠΎΠΊ ΠΈΠ· Π½Π°ΠΊΠΎΠΏΠΈΡΠ΅Π»Ρ ΠΏΡΠΎΠΈΡΡ
ΠΎΠ΄ΠΈΡ Π² ΠΌΠΎΠΌΠ΅Π½Ρ ΠΎΠΊΠΎΠ½ΡΠ°Π½ΠΈΡ ΠΎΠ±ΡΠ»ΡΠΆΠΈΠ²Π°Π½ΠΈΡ Π·Π°ΡΠ²ΠΊΠΈ Π½Π° ΠΏΡΠΈΠ±ΠΎΡΠ΅, ΡΡΠΎ ΠΎΡΠ»ΠΈΡΠ°Π΅Ρ Π΄Π°Π½Π½ΡΠΉ ΠΌΠ΅Ρ
Π°Π½ΠΈΠ·ΠΌ ΡΠ±ΡΠΎΡΠ° ΠΎΡ RED-ΠΏΠΎΠ΄ΠΎΠ±Π½ΡΡ
Π°Π»Π³ΠΎΡΠΈΡΠΌΠΎΠ², Π΄Π»Ρ ΠΊΠΎΡΠΎΡΡΡ
ΡΠ±ΡΠΎΡ Π²ΠΎΠ·ΠΌΠΎΠΆΠ΅Π½ Π² ΠΌΠΎΠΌΠ΅Π½Ρ ΠΏΠΎΡΡΡΠΏΠ»Π΅Π½ΠΈΡ Π² ΡΠΈΡΡΠ΅ΠΌΡ. ΠΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Ρ ΠΌΠΎΠ΄Π΅Π»ΠΈ Ρ ΠΎΠ΄Π½ΠΈΠΌ, Π΄Π²ΡΠΌΡ ΠΈΠ»ΠΈ ΡΡΠ΅ΠΌΡ ΠΏΠΎΡΠΎΠ³Π°ΠΌΠΈ. Π ΡΡΠΈΡ
ΠΌΠΎΠ΄Π΅Π»ΡΡ
ΠΏΠΎΡΠΎΠ³ΠΎΠ²ΡΠ΅ Π·Π½Π°ΡΠ΅Π½ΠΈΡ ΠΎΠΏΡΠ΅Π΄Π΅Π»ΡΡΡ Π½Π΅ ΡΠΎΠ»ΡΠΊΠΎ ΠΌΠ΅ΡΡΠΎ, Ρ ΠΊΠΎΡΠΎΡΠΎΠ³ΠΎ Π² Π½Π°ΠΊΠΎΠΏΠΈΡΠ΅Π»Π΅ Π½Π°ΡΠΈΠ½Π°Π΅ΡΡΡ ΡΠ±ΡΠΎΡ Π·Π°ΡΠ²ΠΎΠΊ, Π½ΠΎ ΠΈ Π΄ΠΎ ΠΊΠ°ΠΊΠΎΠΉ ΠΏΠΎΠ·ΠΈΡΠΈΠΈ Π·Π°ΡΠ²ΠΊΠΈ ΠΌΠΎΠ³ΡΡ Π±ΡΡΡ ΡΠ±ΡΠΎΡΠ΅Π½Ρ. ΠΠ»Ρ Π½Π΅ΠΊΠΎΡΠΎΡΡΡ
ΠΈΠ· ΠΎΠΏΠΈΡΡΠ²Π°Π΅ΠΌΡΡ
ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΡΠΆΠ΅ ΠΏΠΎΠ»ΡΡΠ΅Π½Ρ Π°Π½Π°Π»ΠΈΡΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΠΈ ΡΠΈΡΠ»Π΅Π½Π½ΡΠ΅ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ (ΡΡΡΠ»ΠΊΠΈ Π½Π° ΡΠ°Π±ΠΎΡΡ ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Ρ), Π½ΠΎ Π±ΠΎΠ»ΡΡΠ°Ρ ΡΠ°ΡΡΡ ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ Π½Π°Ρ
ΠΎΠ΄ΠΈΡΡΡ Π² ΠΏΡΠΎΡΠ΅ΡΡΠ΅ ΠΈΠ·ΡΡΠ΅Π½ΠΈΡ, ΠΏΠΎΡΡΠΎΠΌΡ ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Ρ ΡΠΎΠ»ΡΠΊΠΎ ΠΎΠΏΠΈΡΠ°Π½ΠΈΡ ΠΈ Π½Π΅ΠΊΠΎΡΠΎΡΡΠ΅ ΡΠ΅ΠΊΡΡΠΈΠ΅ Π΄Π°Π½Π½ΡΠ΅. ΠΡΠΈΠ²Π΅Π΄Π΅Π½Ρ Π½Π΅ΠΊΠΎΡΠΎΡΡΠ΅ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ ΡΡΠ°Π²Π½Π΅Π½ΠΈΡ ΠΊΠ»Π°ΡΡΠΈΡΠ΅ΡΠΊΠΎΠ³ΠΎ Π°Π»Π³ΠΎΡΠΈΡΠΌΠ° RED Ρ ΠΌΠ΅Ρ
Π°Π½ΠΈΠ·ΠΌΠΎΠΌ ΠΎΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΡ
Senior Computer Science Studentsβ Task and Revised Task Interpretation While Engaged in Programming Endeavor
Developing a computer program is not an easy task. Studies reported that a large number of computer science students decided to change their major due to the extreme challenge in learning programming. Fortunately, studies also reported that learning various self-regulation strategies may help students to continue studying computer science. This study is interested in assessing studentsβ self-regulation, in specific their task understanding and its revision during programming endeavors. Task understanding is specifically selected because it affects the entire programming endeavor.
In this qualitative case study, two female and two male senior computer science students were voluntarily recruited as research participants. They were asked to think aloud while answering five programming problems. Before solving the problem, they had to explain their understanding of the task and after that answer some questions related to their problem-solving process. The participantsβ problem-solving process were video and audio-recorded, transcribed, and analyzed.
This study found that the participantsβ were capable of tailoring their problem-solving approach to the task types, including when understanding the tasks. Given enough time, the participants can understand the problem correctly. When the task is complicated, the participants will gradually update their understanding during the problem-solving endeavor. Some situations may have prevented the participants from understanding the task correctly, including overconfidence, being overwhelmed, utilizing an inappropriate presentation technique, or drawing knowledge from irrelevant experience. Last, the participants tended to be inexperienced in managing unfavorable outcomes
Towards efficient battery swapping service operation under battery heterogeneity
The proliferation of electric vehicles (EVs) has posed significant challenges to the existing power grid infrastructure. It thus becomes of vital importance to efficiently manage the Electro-Mobility for large demand from EVs. Due to limited cruising range of EVs, vehicles have to make frequent stops for recharging, while long charging period is one major concern under plug-in charging. We herein leverage battery swapping (BS) technology to provide an alternative charging service, which substantially reduces the charging duration (from hours down to minutes). Concerning in practice that various battery is generally not compatible with each other, we thus introduce battery heterogeneity into the swapping service, concerning the case that different types of EVs co-exist. A battery heterogeneity-based swapping service framework is then proposed. Further with reservations for swapping service enabled, the demand load can be anticipated at BS stations as a guidance to alleviate service congestion. Therefore, potential hotspots can be avoided. Results show the performance gains under the proposed scheme by comparing to other benchmarks, in terms of service waiting time, etc. In particular, the diversity of battery stock across the network can be effectively managed
Advanced flight control system study
The architecture, requirements, and system elements of an ultrareliable, advanced flight control system are described. The basic criteria are functional reliability of 10 to the minus 10 power/hour of flight and only 6 month scheduled maintenance. A distributed system architecture is described, including a multiplexed communication system, reliable bus controller, the use of skewed sensor arrays, and actuator interfaces. Test bed and flight evaluation program are proposed
Recommended from our members
Foxconned labour as the dark side of the information age: Working conditions at Appleβs contract manufacturers in China
Apple is one of the most dominant and most admired computer companies in the world. But hidden behind the clean surface of Appleβs advanced gadgets lies a dirty world of work. This paper focuses on the dark side of the information age by looking at working conditions in the workshops of Appleβs contract manufacturers in China. For this purpose I suggest a systematic model of working conditions that can be used for assessing and comparing work in different industries. Departing from Karl Marxβs circuit of capital it identifies elements that shape working conditions throughout the capital accumulation process including productive forces, relations of production, the production process, products, and labour legislation. Subsequently I apply this model to the realm of electronics manufacturing. Based on research conducted by corporate watchdogs this paper provides detailed insights into the work and life reality of workers in Appleβs first tier supplier factories. An analysis of Appleβs response to labour rights allegations furthermore reveals three ideological patterns that rather obscure existing problems than offering viable solutions
Natural stone sludge as secondary raw materials: towards a new sustainable recovery process
L'abstract Γ¨ presente nell'allegato / the abstract is in the attachmen
2012 XSEDE User Satisfaction Survey
This is the final report from the 2012 XSEDE User Satisfaction Survey.National Science Foundation OCI-1053575Ope
E-SCAPE New tools and new opportunities for the localization of Expo 2015 general interest services along the Canale Cavour, a backbone of the Milan-Turin urban region
Publication of the Alta Scuola Politecnica project "E-SCAPE. New tools and new opportunities for the localization of Expo 2015 general interest services along the Canale Cavour, a backbone of the Milan-Turin urban region
- β¦